CVE-2015-7985 : Detail

CVE-2015-7985

A01-Broken Access Control
0.1%V3
Local
2015-11-24
19h00 +00:00
2018-10-09
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Valve Steam 2.10.91.91 uses weak permissions (Users: read and write) for the Install folder, which allows local users to gain privileges via a Trojan horse steam.exe file.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-276 Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 9386

Publication date : 2009-08-06 22h00 +00:00
Author : MrDoug
EDB Verified : Yes

Steam (Multiple .exe's) Local Privilage Escalation By: MrDoug mrdoug13[at]gmail[dot]com Version Info: Steam windows client Built: Jun 30 2009, at 13:29:32 Steam API: v008 Steam Package versions: 54/894 Greetz: Slappywag, Doomchip, Bolo, Eliwood, and the rest. Special Thanks: Jeremy Brown and Nine:Situations:Group... Their work led me to this. ================================================== The latest Steam client, (and other Steam related executables) suffer the same privilage escelation issue we saw in Adobe Acrobat NOS the other day (http://milw0rm.com/exploits/9199). This is particularly bad becuase, by default, Steam starts atomaticly. That means that as soon as an administrator logs in... game over. ================================================== POC: C:\>cacls "C:\Program Files\Steam\Steam.exe" C:\Program Files\Steam\Steam.exe BUILTIN\Users:F <-- (Danger Will Robinson!!) BUILTIN\Power Users:C BUILTIN\Administrators:F NT AUTHORITY\SYSTEM:F The executables listed below are also vulnerable, as well as many, MANY more that I have not mentioned. See for yourself. %programfiles%\Steam\uninstall_css.exe %programfiles%\Steam\Unwise32.exe %programfiles%\Steam\GameOverlayUI.exe %programfiles%\Steam\uninstall_steam.exe %programfiles%\Steam\WriteMiniDump.exe %programfiles%\Steam\bin\SteamService.exe --The following are dependant on what games are installed. %programfiles%\Steam\common\audiosurf\Audiosurf.exe %programfiles%\Steam\common\audiosurf\testapp.exe %programfiles%\Steam\common\audiosurf\engine\QuestViewer.exe %programfiles%\Steam\common\left 4 dead\left4dead.exe %programfiles%\Steam\steamapps\[username]\counter-strike source\hl2.exe %programfiles%\Steam\steamapps\[username]\half-life 2\hl2.exe %programfiles%\Steam\steamapps\[username]\garrysmod\hl2.exe ...etc...etc...etc... There are probably 100 more, just look around. I am yet to see an executable in the Steam directory with propor permissions. ================================================== Exploit: So simple... write it yourself you silly goose :3 # milw0rm.com [2009-08-07]

Products Mentioned

Configuraton 0

Valvesoftware>>Steam_client >> Version 2.10.91.91

References